Introduction
Concrete Experience
Objectives
Define network-based signatures and their role in detecting known network threats.
Understand how network-based signatures are created and updated to detect new threats.
Learn how signature-based intrusion detection systems (IDS) operate and their limitations.
Explore the concept of false positives and false negatives in signature-based detection.
TLO Knowledge and Skills
Condition:
Given a classroom, applicable references, and a practical exercise, the Cyber Mission Force student will demonstrate an understanding of Network-Based Signature
Knowledge:
Definition and Role of Network-Based Signatures
Creation and Update of Network-Based Signatures
Operation of Signature-Based Intrusion Detection Systems (IDS)
Concept of False Positives and False Negatives
Skills:
Define Network-Based Signatures and Their Role
Understand the Creation and Update of Network-Based Signatures
Operate Signature-Based Intrusion Detection Systems (IDS)
Evaluate False Positives and False Negatives
Back to top